Speaker authentication system using soft computing approaches

Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy
Format: Article
Language:English
Published: Elsevier 2005
Subjects:
Online Access:http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf
http://irep.iium.edu.my/38183/
http://www.sciencedirect.com/science/article/pii/S0925231205000421#
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources.